syzbot


INFO: rcu detected stall in security_file_open

Status: upstream: reported on 2025/11/22 02:38
Reported-by: syzbot+fa7645d1f6376ab08651@syzkaller.appspotmail.com
First crash: 26d, last: 17d
Similar bugs (11)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in security_file_open (5) tomoyo 1 4 1485d 1595d 0/29 closed as invalid on 2022/02/08 09:50
upstream INFO: rcu detected stall in security_file_open (3) afs 1 C done done 2 1905d 1905d 15/29 fixed on 2020/11/16 12:12
upstream INFO: rcu detected stall in security_file_open mm 1 5 2206d 2207d 0/29 closed as invalid on 2019/12/04 14:04
upstream INFO: rcu detected stall in security_file_open (2) mm 1 2 2171d 2171d 0/29 closed as invalid on 2020/01/08 05:23
linux-6.1 INFO: rcu detected stall in security_file_open 1 1 820d 820d 0/3 auto-obsoleted due to no activity on 2023/12/28 22:15
linux-6.1 INFO: rcu detected stall in security_file_open (3) 1 4 3d19h 115d 0/3 upstream: reported on 2025/08/25 12:48
linux-5.15 INFO: rcu detected stall in security_file_open (2) origin:upstream 1 syz 3 6d16h 310d 0/3 upstream: reported syz repro on 2025/02/11 10:29
upstream INFO: rcu detected stall in security_file_open (4) tomoyo 1 1 1704d 1704d 0/29 auto-closed as invalid on 2021/06/18 10:54
linux-6.1 INFO: rcu detected stall in security_file_open (2) 1 1 477d 477d 0/3 auto-obsoleted due to no activity on 2024/12/06 07:18
linux-5.15 INFO: rcu detected stall in security_file_open 1 3 430d 516d 0/3 auto-obsoleted due to no activity on 2025/01/22 08:07
upstream INFO: rcu detected stall in security_file_open (6) mm 1 C error 297 5h52m 905d 0/29 closed as dup on 2023/06/27 10:07

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P5890/1:b..l
rcu: 	(detected by 1, t=10502 jiffies, g=9797, q=984 ncpus=2)
task:udevd           state:R  running task     stack:26096 pid:5890  ppid:5161   flags:0x00004002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5380 [inline]
 __schedule+0x14d2/0x44d0 kernel/sched/core.c:6699
 preempt_schedule_irq+0xb5/0x140 kernel/sched/core.c:7009
 irqentry_exit+0x67/0x70 kernel/entry/common.c:438
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687
RIP: 0010:lock_acquire+0x1f2/0x410 kernel/locking/lockdep.c:5758
Code: 00 9c 8f 84 24 80 00 00 00 f6 84 24 81 00 00 00 02 0f 85 f5 00 00 00 41 f7 c6 00 02 00 00 74 01 fb 48 c7 44 24 60 0e 36 e0 45 <4b> c7 04 3c 00 00 00 00 66 43 c7 44 3c 09 00 00 43 c6 44 3c 0b 00
RSP: 0018:ffffc90002e470a0 EFLAGS: 00000206
RAX: 0000000000000001 RBX: 0000000000000000 RCX: b709fbba3c0da000
RDX: 0000000000000000 RSI: ffffffff8aaace60 RDI: ffffffff8afc6f40
RBP: ffffc90002e471b0 R08: dffffc0000000000 R09: 1ffffffff21b52a0
R10: dffffc0000000000 R11: fffffbfff21b52a1 R12: 1ffff920005c8e20
R13: ffffffff8cd2fee0 R14: 0000000000000246 R15: dffffc0000000000
 rcu_lock_acquire include/linux/rcupdate.h:334 [inline]
 rcu_read_lock include/linux/rcupdate.h:786 [inline]
 is_bpf_text_address+0x47/0x2a0 kernel/bpf/core.c:741
 kernel_text_address+0xa0/0xd0 kernel/extable.c:125
 __kernel_text_address+0xd/0x30 kernel/extable.c:79
 unwind_get_return_address+0x5d/0xc0 arch/x86/kernel/unwind_orc.c:369
 arch_stack_walk+0x11d/0x190 arch/x86/kernel/stacktrace.c:26
 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:45 [inline]
 kasan_set_track+0x4e/0x70 mm/kasan/common.c:52
 kasan_save_free_info+0x2e/0x50 mm/kasan/generic.c:522
 ____kasan_slab_free+0x126/0x1e0 mm/kasan/common.c:236
 kasan_slab_free include/linux/kasan.h:164 [inline]
 slab_free_hook mm/slub.c:1811 [inline]
 slab_free_freelist_hook+0x130/0x1b0 mm/slub.c:1837
 slab_free mm/slub.c:3830 [inline]
 __kmem_cache_free+0xba/0x1f0 mm/slub.c:3843
 tomoyo_check_open_permission+0x2d3/0x3c0 security/tomoyo/file.c:786
 security_file_open+0x62/0xa0 security/security.c:2854
 do_dentry_open+0x380/0x1500 fs/open.c:916
 do_open fs/namei.c:3640 [inline]
 path_openat+0x274b/0x3190 fs/namei.c:3797
 do_filp_open+0x1c5/0x3d0 fs/namei.c:3824
 do_sys_openat2+0x12c/0x1c0 fs/open.c:1421
 do_sys_open fs/open.c:1436 [inline]
 __do_sys_openat fs/open.c:1452 [inline]
 __se_sys_openat fs/open.c:1447 [inline]
 __x64_sys_openat+0x139/0x160 fs/open.c:1447
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f534a6a7407
RSP: 002b:00007fff2a9a2880 EFLAGS: 00000202 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007f534ae48880 RCX: 00007f534a6a7407
RDX: 00000000000a0241 RSI: 00007fff2a9a3540 RDI: ffffffffffffff9c
RBP: 000055a63eaddb10 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000124 R11: 0000000000000202 R12: 000055a63ea88e20
R13: 00007fff2a9a3540 R14: 00007fff2a9a3140 R15: 00007fff2a9a2d40
 </TASK>
rcu: rcu_preempt kthread starved for 10424 jiffies! g9797 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:27752 pid:17    ppid:2      flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5380 [inline]
 __schedule+0x14d2/0x44d0 kernel/sched/core.c:6699
 schedule+0xbd/0x170 kernel/sched/core.c:6773
 schedule_timeout+0x160/0x280 kernel/time/timer.c:2167
 rcu_gp_fqs_loop+0x302/0x1560 kernel/rcu/tree.c:1667
 rcu_gp_kthread+0x99/0x380 kernel/rcu/tree.c:1866
 kthread+0x2fa/0x390 kernel/kthread.c:388
 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
RIP: 0010:pv_native_safe_halt+0x13/0x20 arch/x86/kernel/paravirt.c:148
Code: cc cc cc cc cc cc cc f3 0f 1e fa 0f 0b 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 66 90 0f 00 2d c3 f4 38 00 f3 0f 1e fa fb f4 <c3> cc cc cc cc cc cc cc cc cc cc cc cc 66 0f 1f 00 55 41 57 41 56
RSP: 0018:ffffffff8ca07d80 EFLAGS: 000002c2
RAX: 66f6bb1daa5e7900 RBX: ffffffff8161981b RCX: 66f6bb1daa5e7900
RDX: 0000000000000001 RSI: ffffffff8aaabce0 RDI: ffffffff8afc6f40
RBP: ffffffff8ca07eb8 R08: ffff8880b8e36b2b R09: 1ffff110171c6d65
R10: dffffc0000000000 R11: ffffed10171c6d66 R12: ffffffff8e4a8e28
R13: 0000000000000000 R14: 0000000000000000 R15: 1ffffffff1952688
FS:  0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00002000000015cb CR3: 000000002de2e000 CR4: 00000000003506f0
Call Trace:
 <TASK>
 arch_safe_halt arch/x86/include/asm/paravirt.h:108 [inline]
 default_idle+0x13/0x20 arch/x86/kernel/process.c:753
 default_idle_call+0x6c/0xa0 kernel/sched/idle.c:97
 cpuidle_idle_call kernel/sched/idle.c:170 [inline]
 do_idle+0x1eb/0x510 kernel/sched/idle.c:282
 cpu_startup_entry+0x43/0x60 kernel/sched/idle.c:380
 rest_init+0x2e2/0x300 init/main.c:744
 arch_call_rest_init+0xe/0x10 init/main.c:841
 start_kernel+0x459/0x4e0 init/main.c:1086
 x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:555
 x86_64_start_kernel+0x60/0x60 arch/x86/kernel/head64.c:536
 secondary_startup_64_no_verify+0x179/0x17b
 </TASK>
sched: RT throttling activated

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/12/01 06:50 linux-6.6.y 1e89a1be4fe9 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-6-kasan INFO: rcu detected stall in security_file_open
2025/11/22 02:37 linux-6.6.y 0a805b6ea8cd 4fb8ef37 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-6-kasan INFO: rcu detected stall in security_file_open
* Struck through repros no longer work on HEAD.